SlideShare a Scribd company logo
SENIOR PROJECT 2007-2008
(Conclusion of the ekoSign project)

9. Conclusion
Experiences Gained and Conclusions
After the Project

Project team members

Hüseyin Çakır, Mehmet Mesut Özışık, Yılmaz Kaya

Abstract:This paper gives some brief information about the last phase of the project. It consists of four
main parts which are; Testing/Experimental Result, API Documentation and Experiences/Lessons learned.
Keywords:Testing/Experimental Result, API Documentation and Experiences/Lessons learned.

http://groups.google.com/group/digitalsignature
digitalsignature@googlegroups.com
PRINT DATE: 05/06/08

1
9.1 Introduction
This paper belongs to the transition phase of the unified process and it mainly represents the work
done at last step of the project. Figure 9.1 shows the steps of the unified process and which step the
introduction paper belongs to.
Inception

Elaboration

1.Introduction
2.Project Plan
3.Basic Concepts

4.Scenario

Construction

5.CSorder
6.SDSorderW
7.SDSorderM
8.MSorderW

Transition

9.Conclusion

Figure 9.1 Steps of Unified Process.

9.2 Testing/ Experimental Result
We tried to conduct a series of different tests to fully exercise the system. The tests we use are;
●
●

Unit Test,
Integration Test,

9.2.1 Unit Test
In unit test we test an unit (class) of the whole working system. We tried to identify unit-level
defects by causing corresponding failures to occur and also determine if the unit is complete and
ready to be submitted for integration as part of a code build.
9.2.2 Integration Test
In integration test, the units (classes) are test in order to be sure that they can work in agreement
with each other without causing any serious mistakes. We tried to identify cause of failures
involving the distribution of integrated system components and be sure about units (classes) can be
fully integrated to satisfy requirements.
9.2.3 System Test
In system test, the whole system is tested and verified that it met the requirements defined in the
introduction document. We tried to conduct functional, performance and security tests during the
system test. We made it sure that user interface standards, and screen look maintain consistency
with the rest of the application. We also tried to check for valid, invalid and limit data input.(e.g.
invalid e-mail input). As a testing phase we needed experienced testers on this project to develop,
perform and validate tests. Since we are not familiar with the testing tools. Unexpected turnovers
can impact the system.

2
9.3 API Documentation
In this project, we used Visual Studio 2005 and as a programming language we used C#, ASP.NET
and XML. We also tried to use class hierarchy and object oriented programming structures to make
our application easier to maintain and use modern software developing standards.
We have six main classes in the project. The classes that provide encryption, decryption, XML
signatures and verifying XML signatures are;
●
●
●
●

encryption class,
decryption class,
signature class and
verifySignature class.

9.3.1 Encryption Class
“encryption” class has a method “Encrypt” that encrypts an XML element using two keys. It
generates a cryptographic public/private key pair and saves the key pair to a secure key container.
The method then creates a separate session key using a cryptographic algorithm. The method uses
the session key to encrypt the XML document and then uses the public key to encrypt the session
key. Finally, the method saves the encrypted session key and the encrypted XML data to the XML
document within a new <EncryptedData> element. The codes about “encryption.cs” are in
Appendix.
9.3.2 Decryption Class
“decryption” class has a method “Decrypt” that decrypts an XML element that had been encrpted
before in other words “Decrypt” method can only decrypt documents that present the specified key
name. The codes about “decryption.cs” are in Appendix.
9.3.3 Signature Class
“signature” class includes a method “SignXml” that sign XML document and attach the signature
to the document in a <Signature> element. The method creates an cryptographic signing key, adds
the key to a secure key container, and then uses the key to digitally sign an XML document. The
key can then be retrieved to verify the XML digital signature, or be used to sign another XML
document. The codes about “signature.cs” are in Appendix.
9.3.4 verifySignature Class
“verifySignature” class includes a method “VerifyXml” that verifies whether the document was sent
from the authorized entity or not. And from the structure of the XML verifying signature also
checks the integrity of the XML document so if any unauthorized change occur in XML document,
it is not going to be verified by this method. It also provides multiple signatures in XML by the use
of reference element in the XML. The codes about “verifySignature.cs” are in Appendix.

3
9.4 Experiences/ Lessons Learned
The digital signing process is used to replace traditional document signing by companies. A lot of
companies use paperwork systems that have not been computerized because they are based on
documents rather than data records. Also a lot of tools used by organizations does not allow
multiple document ownership so they don't fit into existing work flow structure of the companies.
As Gupta mentioned Digital signatures have natural applications in many business processes. This
technology can move beyond playing the role of supporting organizational processes to actually
enabling business processes. However, a different paradigm needs to be established. In particular,
documents have to be explicitly managed as a collection of entities that can have multiple
ownerships[1]. In addition to that the usage of XML provides a powerful structure that eases the
multiple ownership encryption and digital signature on digital documents.
During this project we learned the standard XML structure and how it is used in encryption and
digital signing. We also learned that C# can easily be used for XML document signing and
encryption. We gained the knowledge of using unified process with IEEE software engineering
standards. We developed the project by using Microsoft industry standard for achieving the goal of
a secure and authentication-based automated document management.

4
9.5 References
[1]. A. Gupta., Y.A. Tung, J.R. Marsten, “Digital signature: use and modification to achieve success
in next generational e-business processes”, Science Direct, p.571, June 2003. [Online]. Available:
http://www.sciencedirect.com. [Accessed May 06, 2008].

5

More Related Content

Similar to Conclusion

Step4 managementsendsorderw
Step4 managementsendsorderwStep4 managementsendsorderw
Step4 managementsendsorderw
Hüseyin Çakır
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docx
deanmtaylor1545
 
AvinashBhat_Resume
AvinashBhat_ResumeAvinashBhat_Resume
AvinashBhat_Resume
Avinash Bhat
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET Journal
 
ISTQB Agile Tester - Agile Test Tools
ISTQB Agile Tester - Agile Test ToolsISTQB Agile Tester - Agile Test Tools
ISTQB Agile Tester - Agile Test Tools
Moataz Nabil
 
Automation Framework Design
Automation Framework DesignAutomation Framework Design
Automation Framework Design
Kunal Saxena
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
gattamanenitejeswar
 
Performance tesing coding standards & best practice guidelines v1
Performance tesing coding standards & best practice guidelines v1Performance tesing coding standards & best practice guidelines v1
Performance tesing coding standards & best practice guidelines v1
Argos
 
Evolution of Test Automation
Evolution of Test AutomationEvolution of Test Automation
Evolution of Test Automation
Dharmik Rajput
 
project on Agile approach
project on Agile approachproject on Agile approach
project on Agile approach
Prachi desai
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
The Magic Of Application Lifecycle Management In Vs Public
The Magic Of Application Lifecycle Management In Vs PublicThe Magic Of Application Lifecycle Management In Vs Public
The Magic Of Application Lifecycle Management In Vs Public
David Solivan
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
 
CS2810Team6GroupReport
CS2810Team6GroupReportCS2810Team6GroupReport
CS2810Team6GroupReport
Dan Coles
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
Georgekutty Francis
 
chaitraresume
chaitraresumechaitraresume
chaitraresume
Chaitra Shankar
 
Priyanka Singh_testing_resume
Priyanka Singh_testing_resumePriyanka Singh_testing_resume
Priyanka Singh_testing_resume
Priyanka Singh
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
Kamal Acharya
 
Testing Experience - Evolution of Test Automation Frameworks
Testing Experience - Evolution of Test Automation FrameworksTesting Experience - Evolution of Test Automation Frameworks
Testing Experience - Evolution of Test Automation Frameworks
Łukasz Morawski
 

Similar to Conclusion (20)

Step4 managementsendsorderw
Step4 managementsendsorderwStep4 managementsendsorderw
Step4 managementsendsorderw
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docx
 
AvinashBhat_Resume
AvinashBhat_ResumeAvinashBhat_Resume
AvinashBhat_Resume
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
ISTQB Agile Tester - Agile Test Tools
ISTQB Agile Tester - Agile Test ToolsISTQB Agile Tester - Agile Test Tools
ISTQB Agile Tester - Agile Test Tools
 
Automation Framework Design
Automation Framework DesignAutomation Framework Design
Automation Framework Design
 
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptxFAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE.pptx
 
Performance tesing coding standards & best practice guidelines v1
Performance tesing coding standards & best practice guidelines v1Performance tesing coding standards & best practice guidelines v1
Performance tesing coding standards & best practice guidelines v1
 
Evolution of Test Automation
Evolution of Test AutomationEvolution of Test Automation
Evolution of Test Automation
 
project on Agile approach
project on Agile approachproject on Agile approach
project on Agile approach
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
The Magic Of Application Lifecycle Management In Vs Public
The Magic Of Application Lifecycle Management In Vs PublicThe Magic Of Application Lifecycle Management In Vs Public
The Magic Of Application Lifecycle Management In Vs Public
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
CS2810Team6GroupReport
CS2810Team6GroupReportCS2810Team6GroupReport
CS2810Team6GroupReport
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
 
chaitraresume
chaitraresumechaitraresume
chaitraresume
 
Priyanka Singh_testing_resume
Priyanka Singh_testing_resumePriyanka Singh_testing_resume
Priyanka Singh_testing_resume
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
 
Testing Experience - Evolution of Test Automation Frameworks
Testing Experience - Evolution of Test Automation FrameworksTesting Experience - Evolution of Test Automation Frameworks
Testing Experience - Evolution of Test Automation Frameworks
 

More from Hüseyin Çakır

Basic concepts
Basic conceptsBasic concepts
Basic concepts
Hüseyin Çakır
 
Appendix
AppendixAppendix
Step3sales deptsendsmanagement
Step3sales deptsendsmanagementStep3sales deptsendsmanagement
Step3sales deptsendsmanagement
Hüseyin Çakır
 
Step2sales deptsendswarehouse
Step2sales deptsendswarehouseStep2sales deptsendswarehouse
Step2sales deptsendswarehouse
Hüseyin Çakır
 
Step1customer sendsorder
Step1customer sendsorderStep1customer sendsorder
Step1customer sendsorder
Hüseyin Çakır
 
Scenario
ScenarioScenario
Project plan
Project planProject plan
Project plan
Hüseyin Çakır
 
Introduction
IntroductionIntroduction
Introduction
Hüseyin Çakır
 
Table ofcontents
Table ofcontentsTable ofcontents
Table ofcontents
Hüseyin Çakır
 
Cover
CoverCover
Thesis Defense Exam Presentation
Thesis Defense Exam PresentationThesis Defense Exam Presentation
Thesis Defense Exam Presentation
Hüseyin Çakır
 
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
Hüseyin Çakır
 

More from Hüseyin Çakır (12)

Basic concepts
Basic conceptsBasic concepts
Basic concepts
 
Appendix
AppendixAppendix
Appendix
 
Step3sales deptsendsmanagement
Step3sales deptsendsmanagementStep3sales deptsendsmanagement
Step3sales deptsendsmanagement
 
Step2sales deptsendswarehouse
Step2sales deptsendswarehouseStep2sales deptsendswarehouse
Step2sales deptsendswarehouse
 
Step1customer sendsorder
Step1customer sendsorderStep1customer sendsorder
Step1customer sendsorder
 
Scenario
ScenarioScenario
Scenario
 
Project plan
Project planProject plan
Project plan
 
Introduction
IntroductionIntroduction
Introduction
 
Table ofcontents
Table ofcontentsTable ofcontents
Table ofcontents
 
Cover
CoverCover
Cover
 
Thesis Defense Exam Presentation
Thesis Defense Exam PresentationThesis Defense Exam Presentation
Thesis Defense Exam Presentation
 
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Conclusion

  • 1. SENIOR PROJECT 2007-2008 (Conclusion of the ekoSign project) 9. Conclusion Experiences Gained and Conclusions After the Project Project team members Hüseyin Çakır, Mehmet Mesut Özışık, Yılmaz Kaya Abstract:This paper gives some brief information about the last phase of the project. It consists of four main parts which are; Testing/Experimental Result, API Documentation and Experiences/Lessons learned. Keywords:Testing/Experimental Result, API Documentation and Experiences/Lessons learned. http://groups.google.com/group/digitalsignature digitalsignature@googlegroups.com PRINT DATE: 05/06/08 1
  • 2. 9.1 Introduction This paper belongs to the transition phase of the unified process and it mainly represents the work done at last step of the project. Figure 9.1 shows the steps of the unified process and which step the introduction paper belongs to. Inception Elaboration 1.Introduction 2.Project Plan 3.Basic Concepts 4.Scenario Construction 5.CSorder 6.SDSorderW 7.SDSorderM 8.MSorderW Transition 9.Conclusion Figure 9.1 Steps of Unified Process. 9.2 Testing/ Experimental Result We tried to conduct a series of different tests to fully exercise the system. The tests we use are; ● ● Unit Test, Integration Test, 9.2.1 Unit Test In unit test we test an unit (class) of the whole working system. We tried to identify unit-level defects by causing corresponding failures to occur and also determine if the unit is complete and ready to be submitted for integration as part of a code build. 9.2.2 Integration Test In integration test, the units (classes) are test in order to be sure that they can work in agreement with each other without causing any serious mistakes. We tried to identify cause of failures involving the distribution of integrated system components and be sure about units (classes) can be fully integrated to satisfy requirements. 9.2.3 System Test In system test, the whole system is tested and verified that it met the requirements defined in the introduction document. We tried to conduct functional, performance and security tests during the system test. We made it sure that user interface standards, and screen look maintain consistency with the rest of the application. We also tried to check for valid, invalid and limit data input.(e.g. invalid e-mail input). As a testing phase we needed experienced testers on this project to develop, perform and validate tests. Since we are not familiar with the testing tools. Unexpected turnovers can impact the system. 2
  • 3. 9.3 API Documentation In this project, we used Visual Studio 2005 and as a programming language we used C#, ASP.NET and XML. We also tried to use class hierarchy and object oriented programming structures to make our application easier to maintain and use modern software developing standards. We have six main classes in the project. The classes that provide encryption, decryption, XML signatures and verifying XML signatures are; ● ● ● ● encryption class, decryption class, signature class and verifySignature class. 9.3.1 Encryption Class “encryption” class has a method “Encrypt” that encrypts an XML element using two keys. It generates a cryptographic public/private key pair and saves the key pair to a secure key container. The method then creates a separate session key using a cryptographic algorithm. The method uses the session key to encrypt the XML document and then uses the public key to encrypt the session key. Finally, the method saves the encrypted session key and the encrypted XML data to the XML document within a new <EncryptedData> element. The codes about “encryption.cs” are in Appendix. 9.3.2 Decryption Class “decryption” class has a method “Decrypt” that decrypts an XML element that had been encrpted before in other words “Decrypt” method can only decrypt documents that present the specified key name. The codes about “decryption.cs” are in Appendix. 9.3.3 Signature Class “signature” class includes a method “SignXml” that sign XML document and attach the signature to the document in a <Signature> element. The method creates an cryptographic signing key, adds the key to a secure key container, and then uses the key to digitally sign an XML document. The key can then be retrieved to verify the XML digital signature, or be used to sign another XML document. The codes about “signature.cs” are in Appendix. 9.3.4 verifySignature Class “verifySignature” class includes a method “VerifyXml” that verifies whether the document was sent from the authorized entity or not. And from the structure of the XML verifying signature also checks the integrity of the XML document so if any unauthorized change occur in XML document, it is not going to be verified by this method. It also provides multiple signatures in XML by the use of reference element in the XML. The codes about “verifySignature.cs” are in Appendix. 3
  • 4. 9.4 Experiences/ Lessons Learned The digital signing process is used to replace traditional document signing by companies. A lot of companies use paperwork systems that have not been computerized because they are based on documents rather than data records. Also a lot of tools used by organizations does not allow multiple document ownership so they don't fit into existing work flow structure of the companies. As Gupta mentioned Digital signatures have natural applications in many business processes. This technology can move beyond playing the role of supporting organizational processes to actually enabling business processes. However, a different paradigm needs to be established. In particular, documents have to be explicitly managed as a collection of entities that can have multiple ownerships[1]. In addition to that the usage of XML provides a powerful structure that eases the multiple ownership encryption and digital signature on digital documents. During this project we learned the standard XML structure and how it is used in encryption and digital signing. We also learned that C# can easily be used for XML document signing and encryption. We gained the knowledge of using unified process with IEEE software engineering standards. We developed the project by using Microsoft industry standard for achieving the goal of a secure and authentication-based automated document management. 4
  • 5. 9.5 References [1]. A. Gupta., Y.A. Tung, J.R. Marsten, “Digital signature: use and modification to achieve success in next generational e-business processes”, Science Direct, p.571, June 2003. [Online]. Available: http://www.sciencedirect.com. [Accessed May 06, 2008]. 5